61 |
Development of prototype guidelines for risk management against terror attack in the tourism industry: a Delphi studySmith, Clifford Keith 17 September 2007 (has links)
The purpose of the study was to gather strategies and factors from tourism security professionals from which terrorism risk management policies can be developed. This study utilized the Delphi method in order to provide structure for the group process. Twelve tourism security experts made up the panel completing three rounds of questionnaires via the email based Delphi technique. This research identified fifty-four strategies to reduce the propensity of terror attack at a tourism venue. Those strategies were divided into four levels of priority based on criticality and feasibility. The fifty-four strategies were grouped into nine subordinate categories. The subordinate categories were related to Training, Communications/ Liaison, Planning/ Assessment, Background Checks, ID Badges/ Secure Entrance, Specialty Security Units, Architectural Design, Media Cooperation, and Technology Based strategies. Alongside the strategies are a collection of comments by the experts regarding strengths, weaknesses, and any barriers to implementation pertaining to the individual strategy. Tourism risk managers, security personnel, and insurance underwriters can all use the results in reducing the opportunity for a terrorist attack at a tourism venue. Major research findings from this study included: 1. The strategy receiving the highest criticality ranking over all other strategies involves training first responders on their role in circumventing the success of terrorists. 2. The subordinate category Communication/ Liaison contains the largest number of strategies indicating the significance of this category among experts. 3. The subordinate category of Specialty Security Units contains the second highest number of strategies indicating the importance of the topic among experts. 4. All of the technology based strategies fell into the lowest priority level. Based on the findings of this study, researcher recommendations include: 1. The guidelines developed in this study should be used by operators of tourism venues to make the best use of limited resources. 2. National or international conferences should be established to further discuss these issues. 3. A greater number of communications mediums should be established to facilitate the exchange of ideas and experiences between affected professionals. 4. Insurance providers should use this information to establish validated guidelines so that, if prospective clients adhered to the recommendations, a reduction in premiums could be offered. 5. Other entities may benefit from this study, such as public school systems, the energy production industry, hospital systems, and pipeline systems.
|
62 |
The origins and strategic objectives of the Al Qaeda organization in the Islamic Maghreb (AQIM)Hajji, Khalifa. January 2009 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Hafez, Mohammed M. Second Reader: Lee, Doowan. "December 2009." Author(s) subject terms: Algerian radical group evolution from the FIS to the GIA, the GSPC then to the AQIM; AQIM origin and strategy; Links between AQIM and North African radical groups; GICM: The Moroccan Islamic Combat Group; LIFG: the Libyan Islamic Fighting Group; MTI: The Islamic Tendency Movement; Terrorism is North Africa. Description based on title screen as viewed on Jan. 26, 2010. Includes bibliographical references (p. 81-84). Also available in print.
|
63 |
Assessing domestic right-wing extremism using the theory of collective behaviorBaldoza, Arnold C. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009. / Thesis Advisor(s): Rasmussen, Maria. Second Reader: Dahl, Erik. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Domestic right-wing extremism, domestic far right, far right, terrorism, theory of collective behavior, right-wing extremism. Includes bibliographical references (p. 101-129). Also available in print.
|
64 |
Möjligheter och lämpligheten i att frånta terrorister deras medborgarskapAndersson, Madelene January 2015 (has links)
No description available.
|
65 |
A simulation on organizational communication patterns during a terrorist attackBas, Ali. Karaca, Volkan. January 2008 (has links) (PDF)
Thesis (M.S. in Management)--Naval Postgraduate School, June 2008. / Thesis Advisor(s): Gibbons, Deborah E. ; Suchan, James E. "June 2008." Description based on title screen as viewed on August 28, 2008. Includes bibliographical references (p. 57-61). Also available in print.
|
66 |
Hezbollah the network and its support systems, can they be stopped?/Philippone, Douglas S. January 2008 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, June 2008. / Thesis Advisor(s): Freeman, Michael. "June 2008." Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 55-59). Also available in print.
|
67 |
Solving the maximum clique problems on a class of network graphs, with applications to social networksPollatos, Spyridon. January 2008 (has links) (PDF)
Thesis (M.S. in Operations Research and M.S. in Applied Mathematics)--Naval Postgraduate School, June 2008. / Thesis Advisor(s): Carlyle, W. Matthew ; Gera, Ralucca. "June 2008." Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 69-70). Also available in print.
|
68 |
Turkey and PKK terrorism.Zehni, Tevfik. January 2008 (has links) (PDF)
Thesis (M.A. in Security Studies (Defense Decision-Making))--Naval Postgraduate School, June 2008. / Thesis Advisor(s): Russell, James ; Baylouny, Anne Marie. "June 2008." Description based on title screen as viewed on August 25, 2008. Includes bibliographical references (p. 63-69). Also available in print.
|
69 |
Fourth wave terrorism and the international systemSmith, Paul J., January 2005 (has links)
Thesis (Ph. D.)--University of Hawaii at Manoa, 2005. / Includes bibliographical references (leaves 330-356).
|
70 |
The evolution of regional counterterrorism centers within a national counterterrorism network is it time to fuse more than information? /Leavell, Ron. January 2007 (has links) (PDF)
Thesis (M.A. in in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2007. / Thesis Advisor(s): Simeral, Robert. "March 2007." "Change in distribution statement for Evolution of regional counterterrorism centers within a national counterterrorism network -- March 2007." Description based on title screen as viewed on Oct. 15, 2008. Includes bibliographical references (p. 125-133). Also available in print.
|
Page generated in 0.0531 seconds